Cargando…
New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks
Fairness is an important standard needed to be considered in a secure quantum key agreement (QKA) protocol. However, it found that most of the quantum key agreement protocols in the travelling model are not fair, i.e., some of the dishonest participants can collaborate to predetermine the final key...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6868178/ https://www.ncbi.nlm.nih.gov/pubmed/31748651 http://dx.doi.org/10.1038/s41598-019-53524-4 |
_version_ | 1783472212822458368 |
---|---|
author | Sun, Zhiwei Cheng, Rong Wu, Chunhui Zhang, Cai |
author_facet | Sun, Zhiwei Cheng, Rong Wu, Chunhui Zhang, Cai |
author_sort | Sun, Zhiwei |
collection | PubMed |
description | Fairness is an important standard needed to be considered in a secure quantum key agreement (QKA) protocol. However, it found that most of the quantum key agreement protocols in the travelling model are not fair, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. Thus, how to construct a fair and secure key agreement protocol has obtained much attention. In this paper, a new fair multiparty QKA protocol that can resist the collusive attack is proposed. More specifically, we show that in a client-server scenario, it is possible for the clients to share a key and reveal nothing about what key has been agreed upon to the server. The server prepares quantum states for clients to encode messages to avoid the participants’ collusive attack. This construction improves on previous work, which requires either preparing multiple quantum resources by clients or two-way quantum communication. It is proven that the protocol does not reveal to any eavesdropper, including the server, what key has been agreed upon, and the dishonest participants can be prevented from collaborating to predetermine the final key. |
format | Online Article Text |
id | pubmed-6868178 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-68681782019-12-04 New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks Sun, Zhiwei Cheng, Rong Wu, Chunhui Zhang, Cai Sci Rep Article Fairness is an important standard needed to be considered in a secure quantum key agreement (QKA) protocol. However, it found that most of the quantum key agreement protocols in the travelling model are not fair, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. Thus, how to construct a fair and secure key agreement protocol has obtained much attention. In this paper, a new fair multiparty QKA protocol that can resist the collusive attack is proposed. More specifically, we show that in a client-server scenario, it is possible for the clients to share a key and reveal nothing about what key has been agreed upon to the server. The server prepares quantum states for clients to encode messages to avoid the participants’ collusive attack. This construction improves on previous work, which requires either preparing multiple quantum resources by clients or two-way quantum communication. It is proven that the protocol does not reveal to any eavesdropper, including the server, what key has been agreed upon, and the dishonest participants can be prevented from collaborating to predetermine the final key. Nature Publishing Group UK 2019-11-20 /pmc/articles/PMC6868178/ /pubmed/31748651 http://dx.doi.org/10.1038/s41598-019-53524-4 Text en © The Author(s) 2019 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Sun, Zhiwei Cheng, Rong Wu, Chunhui Zhang, Cai New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks |
title | New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks |
title_full | New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks |
title_fullStr | New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks |
title_full_unstemmed | New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks |
title_short | New Fair Multiparty Quantum Key Agreement Secure against Collusive Attacks |
title_sort | new fair multiparty quantum key agreement secure against collusive attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6868178/ https://www.ncbi.nlm.nih.gov/pubmed/31748651 http://dx.doi.org/10.1038/s41598-019-53524-4 |
work_keys_str_mv | AT sunzhiwei newfairmultipartyquantumkeyagreementsecureagainstcollusiveattacks AT chengrong newfairmultipartyquantumkeyagreementsecureagainstcollusiveattacks AT wuchunhui newfairmultipartyquantumkeyagreementsecureagainstcollusiveattacks AT zhangcai newfairmultipartyquantumkeyagreementsecureagainstcollusiveattacks |